م. إبراهيم الرميان
م. إبراهيم الرميان

@Ibraheem_111

27 تغريدة 51 قراءة Feb 15, 2021
للمهتمين في مجال #الأمن_السيبراني #أمن_المعلومات
سأذكر تحت هذه التغريدة عدة نقاط من تشابتر 1
لشهادة (+CSA / محلل الأمن السيبراني) التي تتطلب خبرة 3-4 سنوات.
Chapter 1
Defending Against Cybersecurity Threats
1-Cybersecurity analysts are responsible for protecting the confidentiality, integrity, and availability of information and information systems used by their organizations.
2-. Cybersecurity professionals develop and implement security controls, including firewalls, access control lists, and encryption, to prevent unauthorized access to information.
3-Availability controls, such as fault tolerance, clustering, and backups, seek to ensure that legitimate users may gain access as needed.
4-A vulnerability is a weakness in a device, system, application, or process that might allow an attack to take place. Vulnerabilities are internal factors that may be controlled by cybersecurity professionals.
5-A threat in the world of cybersecurity is an outside force that may exploit a vulnerability. For example, a hacker who would like to conduct a DoS attack against a website and knows about an Apache vulnerability poses a clear cybersecurity threat.
6-A risk is the combination of a threat and a corresponding vulnerability. Both of these factors must be present before a situation poses a risk to the security of an organization.
7-The relationship between risks, threats, and vulnerabilities is an important one, and it is often represented by this equation:
Risk = Threat × Vulnerability
8-Threats/Exploit/Risk/Asset
9-risk management
Cybersecurity professionals use risk management strategies, such as risk acceptance, risk avoidance, risk mitigation, and risk transference, to reduce the likelihood and impact of risks identified during risk assessments.
10-Technical controls are systems, devices, software, and settings that work to enforce confidentiality, integrity, and/or availability requirements. Examples of technical controls include building a secure network and implementing endpoint security.
11-Operational controls are practices and procedures that bolster cybersecurity. Examples of operational controls include conducting penetration testing and using reverse engineering to analyze acquired software.
12-jump box
Notice that the network in Figure 1.7 also contains a DMZ with a server called the jump box. The purpose of this server is to act as a secure transition point between the corporate network and the datacenter network, providing a trusted path between the two zones.
13-The NIST SP 800-30 risk assessment process suggests that an organization should identify threats and vulnerabilities and then use that information to determine the level of risk posed by the combination of those threats and vulnerabilities.
youtube.com
14-Executing a Penetration Test
15-Agent-based solutions, such as 802.1x, require that the device requesting access to the network run special software designed to communicate with the NAC service. 16-Agentless approaches to NAC conduct authentication in the web browser and do not require special software.
17-The “captive portal” NAC solutions found in hotels that hijack all web requests until the guest enters a room number are examples of in-band NAC.
18-captive portal
19-Out-of-band NAC solutions, such as 802.1x, leverage the existing network infrastructure and has network devices communicate with authentication servers and then reconfigure the network to grant or deny network access, as needed.
20-Time of Day Users may be authorized to access the network only during specific time periods, such as during business hours.
22-The DMZ is a special network zone designed to house systems that receive connections from the outside world, such as web and email servers.
23-Penetration tests may be performed by an organization’s internal staff or by external consultants. In the case of internal tests, they require highly skilled individuals and are quite time-consuming
24-The attack phase of a penetration test is also known as the exploitation phase. Questions on the exam referring to test execution, the attack phase, and the exploitation phase are all referring to the same thing.
25-
26- A threat in the world of cybersecurity is an outside force that may exploit a vulnerability.
27-The red team plays the role of the attacker and uses reconnaissance and exploitation tools to attempt to gain access to the protected network.
28-The blue team is responsible for securing the targeted environment and keeping the red team out by building, maintaining, and monitoring a comprehensive set of security controls.

جاري تحميل الاقتراحات...